Information processing apparatus, information processing method, and program
An information processing apparatus (10) includes a selection reception unit (110) that receives an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability, a remaining terminal identification unit (120) that reads out terminal-specific countermeasure information, indicating a countermeasure applicable for each terminal against the vulnerability, from a storage unit that stores the terminal-specific countermeasure information, and identifies a remaining terminal which is a terminal that would be left with the vulnerability on the basis of the read-out terminal-specific countermeasure information, and a remaining terminal information providing unit (130) that provides the number of identified remaining terminals.
Latest NEC CORPORATION Patents:
- METHOD, DEVICE AND COMPUTER READABLE MEDIUM FOR COMMUNICATIONS
- METHOD OF COMMUNICATION APPARATUS, METHOD OF USER EQUIPMENT (UE), COMMUNICATION APPARATUS, AND UE
- CONTROL DEVICE, ROBOT SYSTEM, CONTROL METHOD, AND RECORDING MEDIUM
- OPTICAL COHERENCE TOMOGRAPHY ANALYSIS APPARATUS, OPTICAL COHERENCE TOMOGRAPHY ANALYSIS METHOD, AND NON-TRANSITORY RECORDING MEDIUM
- METHOD AND DEVICE FOR INDICATING RESOURCE ALLOCATION
This application is a National Stage Entry of PCT/JP2016/074607 filed on Aug. 24, 2016, which claims priority from Japanese Patent Application 2015-182073 filed on Sep. 15, 2015, the contents of all of which are incorporated herein by reference, in their entirety.
TECHNICAL FIELDThe present invention relates to a technique for assisting a manager's decision-making relevant to a countermeasure against vulnerability.
BACKGROUND ARTAn example of invention in which information of each terminal is collected, and countermeasures (measures) are drawn up against vulnerability present in each terminal is disclosed in, for example, the following Patent Documents 1 to 3. The following Patent Document 1 discloses a technique to analyze risk on the basis of the state of a system in operation, and to provide an optimum countermeasure method, in consideration of various restrictions imposed on the system in operation, from countermeasure alternatives for reducing the risk. In addition, the following Patent Document 2 discloses a technique allowing appropriate countermeasure to be drawn-up in a combination of countermeasures that can be taken in practice, in further consideration of a restriction such as an exclusive relationship between security countermeasures. The following Patent Document 3 discloses a system in which a set of countermeasures against a potential threat with respect to a technical system is ranked on the basis of effectiveness, and the highest-ranked set of countermeasures is applied.
RELATED DOCUMENTS Patent Documents[Patent Document 1] Japanese Patent No. 5304243
[Patent Document 2] Japanese Patent No. 5125069
[Patent Document 3] Japanese Patent No. 5406195
SUMMARY OF THE INVENTION Technical ProblemCountermeasures other than patch application coping with vulnerability are dependent on the circumstances of terminals to be managed, and a single countermeasure may not be applicable to all terminals. For this reason, in a case where countermeasures are performed on a large number of terminals, it is necessary to plan countermeasures against vulnerability with respect to individual terminals, and a huge amount of operational cost is thus incurred. In addition, in a case where a plurality of applicable countermeasures are present, it is not clearly understood to what extent risk remains after arbitrary countermeasures are performed, and which countermeasures should be performed later. Hence, it has been difficult to draw up a plan of countermeasures.
An object of the present invention is to provide a technique to visualize which countermeasures are applicable to a large number of terminals and to what extent risk remains after countermeasure, and to thereby assist a security manager's decision-making.
Solution to ProblemAccording to the present invention, there is provided an information processing apparatus including: a selection reception unit that receives an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability; a remaining terminal identification unit that reads out terminal-specific countermeasure information, indicating a countermeasure applicable for each terminal against the vulnerability, from a storage unit that stores the terminal-specific countermeasure information, and identifies a remaining terminal which is a terminal that would be left with the vulnerability on the basis of the read-out terminal-specific countermeasure information; and a remaining terminal information providing unit that provides the number of identified remaining terminals.
According to the present invention, there is provided an information processing method performed by a computer, the method including: receiving an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability; reading out terminal-specific countermeasure information, indicating a countermeasure applicable for each terminal against the vulnerability, from a storage unit that stores the terminal-specific countermeasure information, and identifying a remaining terminal which is a terminal that would be left with the vulnerability on the basis of the read-out terminal-specific countermeasure information; and provide the number of identified remaining terminals.
According to the present invention, there is provided a program for causing a computer to function as: a selection reception unit that receives an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability; a remaining terminal identification unit that reads out terminal-specific countermeasure information, indicating a countermeasure applicable for each terminal against the vulnerability, from a storage unit that stores the terminal-specific countermeasure information, and identifies a remaining terminal which is a terminal that would be left with the vulnerability on the basis of the read-out terminal-specific countermeasure information; and a remaining terminal information providing unit that provides the number of identified remaining terminals.
Advantageous Effects of InventionAccording to the present invention, it is possible to visualize which countermeasures are applicable to a large number of terminals and to what extent risk remains after countermeasure, and for a security manager to easily perform the drawing-up of countermeasures against vulnerability.
The above and other objects, features and advantages will be made clearer from certain preferred embodiment described below, and the following accompanying drawings.
Hereinafter, example embodiments of the present invention will be described with reference to the accompanying drawings. In all the drawings, like elements are referenced by like reference numerals and the descriptions thereof will not be repeated.
First Example Embodiment[Process Configuration]
The selection reception unit 110 receives an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability. The selection reception unit 110 receives selection inputs of countermeasures against vulnerability through, for example, a screen as shown in
The screen of
When the selection reception unit 110 receives selection inputs of countermeasures on the screen as shown in
The remaining terminal identification unit 120 reads out terminal-specific countermeasure information from a predetermined storage unit (not shown), and identifies terminals that would be left with vulnerability (hereinafter, also denoted by remaining terminals) on the basis of the read-out terminal-specific countermeasure information. As described above, the terminal-specific countermeasure information is information indicating countermeasures applicable for each terminal against vulnerability, and is stored in a storage unit in formats as shown in
The remaining terminal information providing unit 130 provides the number of identified remaining terminals to, for example, a display apparatus or the like connected to the information processing apparatus 10. For example, the remaining terminal information providing unit 130 tallies up the number of remaining terminals identified by the remaining terminal identification unit 120, and displays the results in the screen of
[Hardware Configuration]
The information processing apparatus 10 includes a processor 101, a memory 102, a storage 103, an input and output interface (input and output I/F) 1004, a communication interface (communication I/F) 105, and the like. The processor 101, the memory 102, the storage 103, the input and output interface 104, and the communication interface 105 are connected to each other by a data transmission channel for mutually transmitting and receiving data.
The processor 101 is an arithmetic processing apparatus such as, for example, a central processing unit (CPU), or a graphics processing unit (GPU). The memory 102 is a memory such as, for example, a random access memory (RAM) or a read only memory (ROM). The storage 103 is a storage apparatus such as, for example, a hard disk drive (HDD), a solid state drive (SSD), or a memory card. In addition, the storage 103 may be a memory such as a RAM or a ROM.
The storage 103 stores programs for implementing functions of the respective processing units (such as the selection reception unit 110, the remaining terminal identification unit 120, and the remaining terminal information providing unit 130) included in the information processing apparatus 10. The processor 101 realizes the functions of the respective processing units by executing these respective programs. Here, when the processor 101 executes the respective programs, these programs may be read out into the memory 102 and then be executed, and may executed without being read out into the memory 102.
The input and output interface 104 is connected to a display apparatus 1041, an input apparatus 1042 or the like. The display apparatus 1041 is an apparatus, such as liquid crystal display (LCD) or a cathode ray tube (CRT) display, which displays a screen corresponding to drawing data processed by the processor 101. The input apparatus 1042 is an apparatus that receives an operator's operation input, and is, for example, a keyboard, a mouse, a touch sensor, and the like. The display apparatus 1041 and the input apparatus 1042 may be formed integrally with each other, and be realized as a touch panel.
The communication interface 105 transmits and receives data to and from an external apparatus. For example, the communication interface 105 communicates with the external apparatus through a wired network or a wireless network.
It should be noted that the hardware configuration of the information processing apparatus 10 is not limited to the configuration shown in
An operation example of the information processing apparatus 10 in the present example embodiment will be described with reference to
First, the selection reception unit 110 receives a user's input through the screen as shown in
Hereinbefore, in the present example embodiment, the number of remaining terminals (remaining risks) on the assumption that the selected countermeasure is applied is provided to a security manager. Thereby, according to the present example embodiment, it is possible to exclude the ambiguity or complication of the drawing-up of vulnerability countermeasures due to the presence of terminals to which a plurality of countermeasures are applicable. As a result, it is possible for a security manager to easily draw up a plan of countermeasures against vulnerability. In addition, in the present example embodiment, in a case where a plurality of terminals having vulnerability are present, it is possible to visibly provide countermeasures against the vulnerability and the number of terminals to which each of the countermeasures is applicable. These pieces of information are helpful when a security manager draws up a plan against vulnerability.
Modification Example of First Example EmbodimentThe remaining terminal information providing unit 130 may be configured to further provide information for specifying each of the identified remaining terminals, in addition to the number of remaining terminals identified by the remaining terminal identification unit 120. In this case, a screen as shown in
In the present example embodiment, the first example embodiment will be described in more detail.
[System Configuration]
[Process Configuration]
As shown in
The terminal information collection unit 140 collects terminal information from each of the terminals 30 to be managed, and obtains information as shown in
The vulnerability examination unit 150 examines a terminal 30 to be managed having vulnerability and generates vulnerability information including the terminal-specific countermeasure information as shown in
The display processing unit 160 generates a screen which is displayed on the display unit of the manager terminal 20 using the vulnerability information stored in the vulnerability information storage unit 152, and outputs the generated screen to the manager terminal 20. In the present example embodiment, the display processing unit 160 generates a screen for classifying and displaying, for example, terminals having vulnerability as shown in
Here, another example of the screen which is generated by the display processing unit 160 will be described with reference to
In the example shown in
[Hardware Configuration]
The information processing apparatus 10 of the present example embodiment has the same hardware configuration as that in the first example embodiment. The storage 103 further stores programs for realizing functions of the respective processing units (the terminal information collection unit 140, the vulnerability examination unit 150, and the display processing unit 160) of the present example embodiment, and the respective processing units of the present example embodiment are realized by the processor 101 executing these programs. In addition, the memory 102 or the storage 103 also serves as the vulnerability information storage unit 152 and the classification information storage unit 162.
Operation ExampleAn operation example of the information processing apparatus 10 in the present example embodiment will be described with reference to
The terminal information collection unit 140 collects the terminal information of each terminal 30 to be managed, for example, in accordance with a screen display request from the manager terminal 20 (S201). The vulnerability examination unit 150 examines terminals 30 to be managed having vulnerability, for example, on the basis of the collected terminal information of each terminal 30 to be managed, and generates vulnerability information (S202). The vulnerability examination unit 150 can identify terminals 30 to be managed having vulnerability, applicable countermeasures and the like, for example, in light of the collected terminal information of each terminal 30 to be managed and the vulnerability information provided from each vendor or the like. Note that the processes of S201 and S202 may be executed in advance before the screen display request from the manager terminal 20 is received. In this case, the following process of S203 is executed in accordance with the screen display request from the manager terminal 20.
The display processing unit 160 generates a screen (for example, screen of
It should be noted that, in a case where an operation of selecting a plurality of countermeasures is performed in the manager terminal 20, the remaining terminal identification unit 120 identifies remaining terminals as follows. First, the remaining terminal identification unit 120 identifies terminals to which each of the plurality of countermeasures selected is applicable. Here, it is assumed that the vulnerability information storage unit 152 stores vulnerability information including the terminal-specific countermeasure information as shown in
The remaining terminal information providing unit 130 tallies up the number of remaining terminals identified in S205, and outputs the tallied-up number to the display processing unit 160 (S206). Here, the remaining terminal information providing unit 130 may further acquire information (such as, for example, terminal name and MAC address) for specifying each remaining terminal identified in S205 and output the acquired information to the display processing unit 160. The display processing unit 160 updates the screen displayed in the manager terminal 20 on the basis of the information from the remaining terminal information providing unit 130 (S207).
Hereinbefore, according to the present example embodiment, it is possible to obtain the same effect as that in the first example embodiment.
Third Example EmbodimentIn the present example embodiment, the information processing apparatus 10 further having a function of making the draw-up of a plan against vulnerability efficient will be described below.
[Process Configuration]
The countermeasure optimization unit 164 identifies combinations of countermeasures in which the number of remaining terminals identified by the remaining terminal identification unit 120 is the smallest, on the basis of the terminal-specific countermeasure information. For example, it is assumed that the terminal-specific countermeasure information as shown in
In addition, as in this example, in a case where there are a plurality of “combinations of countermeasures in which the number of remaining terminals is the smallest”, the countermeasure optimization unit 164 may be configured to determine a combination in which the number of countermeasures is the smallest among the determined combinations. In the example exemplified herein, the countermeasure optimization unit 164 determines a combination of the countermeasure (2) and the countermeasure (3) as the combination in which “the number of countermeasures is the smallest”.
The countermeasure optimization unit 164 displays the determined “combinations of countermeasures in which the number of remaining terminals is the smallest” or the “combination in which the number of countermeasures is the smallest” among them, in the screen displayed in the manager terminal 20. The countermeasure optimization unit 164 highlights the determined “combinations of countermeasures in which the number of remaining terminals is the smallest” or the “combination in which the number of countermeasures is the smallest” among them, on the screen displayed in the manager terminal 20, for example, at the time of initially displaying a screen in the manager terminal 20, or in accordance with pressing down of a predetermined button provided on the screen. An operator of the manager terminal 20 can select countermeasures to be performed by referring to the information provided from the countermeasure optimization unit 164. In addition, without being limited thereto, the countermeasure optimization unit 164 may use the determined “combinations of countermeasures in which the number of remaining terminals is the smallest” or the “combination in which the number of countermeasures is the smallest” among them, as an automatic selection input for the screen displayed in the manager terminal 20. In this case, the selection reception unit 110 receives the countermeasures automatically selected by the countermeasure optimization unit 164 as an input, and the remaining terminal identification unit 120 identifies remaining terminals on the assumption that the selected countermeasures are executed. The remaining terminal information providing unit 130 tallies up the number of remaining terminals identified by the remaining terminal identification unit 120 and displays the tallied-up number in the screen. An operator of the manager terminal 20 checks contents displayed in the screen, and manually changes the selection contents if necessary.
[Hardware Configuration]
The information processing apparatus 10 of the present example embodiment has the same hardware configuration as that in the first example embodiment. The storage 103 further stores programs for realizing a function of the countermeasure optimization unit 164 of the present example embodiment, and the countermeasure optimization unit 164 of the present example embodiment is realized by the processor 101 executing these programs.
Hereinbefore, according to the present example embodiment, at least the “combinations of countermeasures in which the number of remaining terminals is the smallest” are determined, and are set on the screen displayed in the manager terminal 20, at the time of initial display of the screen or in accordance with a predetermined operation. In addition, according to the present example embodiment, the “combination in which the number of countermeasures is the smallest” is further determined, and is set on the screen displayed in the manager terminal 20. Thereby, it is possible to provide effective combinations of countermeasures from the information processing apparatus 10 to a security manager, and to reduce time and labor for a security manager to be taken to work.
Hereinbefore, although the example embodiments of the present invention have been set forth with reference to the accompanying drawings, the example embodiments are merely illustrative of the present invention, and various configurations other than those stated above can be adopted.
For example, in each of the above-described example embodiments, a button for executing a countermeasure with respect to each terminal to be managed on the basis of the contents selected on the screen may be further provided on the screen. In a case where the button is pressed down, the information processing apparatus 10 generates a command for causing each terminal to execute a countermeasure in accordance with the selected contents, and outputs the generated command toward each terminal.
In addition, in each of the example embodiments described above, an aspect has been described in which the number of remaining terminals is provided. However, it is also possible to provide an index relating to the remaining terminals. The index relating to the remaining terminals includes, for example, a ratio of the number of remaining terminals to the number of terminals having vulnerability (risk), a color according to the ratio, or the like.
In addition, in each of the example embodiments described above, an aspect has been described in which the number of remaining terminals is provided in accordance with a selection input of countermeasures against vulnerability. However, for example, in a case where the number of applicable countermeasures is small, or the like, it is also possible to provide the number of remaining terminals on the assumption that all the countermeasures are applied, from the beginning, regardless of the selection input.
In addition, in each of the example embodiments described above, an aspect has been described in which the terminal-specific countermeasure information generated by examining terminals to be managed in advance is read out from the storage unit, and the remaining terminals which are terminals that would be left with vulnerability are identified on the basis of the read-out terminal-specific countermeasure information. However, it is also possible to acquire the terminal-specific countermeasure information by examining the terminals to be managed when the remaining terminals are identified.
In addition, in a plurality of flow diagrams using the aforementioned description, a plurality of steps (processes) are described in order, but the execution order of processes which are executed in each example embodiment is not limited to the described order. In each example embodiment, the order of processes shown can be changed within a range without causing any problem in terms of contents. In addition, each example embodiment described above can be combined in a range consistent with the contents thereof.
Hereinafter, examples of reference forms are appended.
1. An information processing apparatus including:
a selection reception unit that receives an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability;
a remaining terminal identification unit that reads out terminal-specific countermeasure information, indicating a countermeasure applicable for each terminal against the vulnerability, from a storage unit that stores the terminal-specific countermeasure information, and identifies a remaining terminal which is a terminal that would be left with the vulnerability on the basis of the read-out terminal-specific countermeasure information; and
a remaining terminal information providing unit that provides the number of identified remaining terminals.
2. The information processing apparatus according to 1,
wherein the remaining terminal information providing unit outputs information for specifying each of the identified remaining terminals, in addition to the number of the identified remaining terminals.
3. The information processing apparatus according to 1 or 2,
wherein in a case where a plurality of countermeasures are selected by the selection reception unit, the remaining terminal identification unit identifies a terminal to which each of the selected plurality of countermeasures is applicable, on the basis of the terminal-specific countermeasure information, and identifies the remaining terminal using a logical sum of terminals identified for each of the countermeasures.
4. The information processing apparatus according to any one of 1 to 3, further including a countermeasure optimization unit that determines a combination of countermeasures in which the number of the remaining terminals is the smallest, on the basis of the terminal-specific countermeasure information.
5. The information processing apparatus according to 4,
wherein among combinations of countermeasures in which the number of the remaining terminals is the smallest, the countermeasure optimization unit determines a combination in which the number of countermeasures included in the combination is the smallest.
6. An information processing method performed by a computer, the method including:
receiving an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability;
reading out terminal-specific countermeasure information, indicating a countermeasure applicable for each terminal against the vulnerability, from a storage unit that stores the terminal-specific countermeasure information, and identifying a remaining terminal which is a terminal that would be left with the vulnerability on the basis of the read-out terminal-specific countermeasure information; and
providing the number of identified remaining terminals.
7. The information processing method performed by the computer according to 6, the method including outputting information for specifying each of the identified remaining terminals, in addition to the number of the identified remaining terminals.
8. The information processing method performed by the computer according to 6 or 7, the method including, in a case where a plurality of countermeasures are selected by the selection reception unit, identify a terminal to which each of the selected plurality of countermeasures is applicable, on the basis of the terminal-specific countermeasure information, and identify the remaining terminal using a logical sum of terminals identified for each of the countermeasures.
9. The information processing method performed by the computer according to any one of 6 to 8, the method including determining a combination of countermeasures in which the number of the remaining terminals is the smallest, on the basis of the terminal-specific countermeasure information.
10. The information processing method performed by the computer according to 9, the method including determining, among combinations of countermeasures in which the number of the remaining terminals is the smallest, a combination in which the number of countermeasures included in the combinations is the smallest.
11. A program for causing a computer to function as:
a selection reception unit that receives an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability;
a remaining terminal identification unit that reads out terminal-specific countermeasure information, indicating a countermeasure applicable for each terminal against the vulnerability, from a storage unit that stores the terminal-specific countermeasure information, and identifies a remaining terminal which is a terminal that would be left with the vulnerability on the basis of the read-out terminal-specific countermeasure information; and
a remaining terminal information providing unit that provides the number of identified remaining terminals.
12. The program according to 11, causing the computer to function as:
the remaining terminal information providing unit that outputs information for specifying each of the identified remaining terminals, in addition to the number of the identified remaining terminals.
13. The program according to 11 or 12, causing the computer to function as:
the remaining terminal identification unit that identifies, in a case where a plurality of countermeasures are selected by the selection reception unit, a terminal to which each of the selected plurality of countermeasures is applicable, on the basis of the terminal-specific countermeasure information, and identifies the remaining terminal using a logical sum of terminal identified for each of the countermeasures.
14. The program according to any one of 11 to 13, causing the computer to further function as a countermeasure optimization unit that determines a combination of countermeasures in which the number of the remaining terminals is the smallest, on the basis of the terminal-specific countermeasure information.
15. The program according to 14, causing the computer to function as:
the countermeasure optimization unit that determines, among combinations of countermeasures in which the number of the remaining terminals is the smallest, a combination in which the number of countermeasures included in the combination is the smallest.
This application is based on Japanese Patent Application No. 2015-182073 filed on Sep. 15, 2015, the content of which is incorporated hereinto by reference.
Claims
1. An information processing apparatus comprising:
- a memory storing one or more instructions; and
- a processor configured to execute the one or more instructions to: receive an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability; read out terminal-specific countermeasure information, indicating a countermeasure applicable for each of a plurality of terminals against the vulnerability, from a storage that stores the terminal-specific countermeasure information, and based on assumption that the selected countermeasure is applied to the plurality of terminals, identify remaining terminals from among the plurality of terminals which are terminals that would be left with the vulnerability due to non-applicability of the selected countermeasure based on the read-out terminal-specific countermeasure information; count a number of terminals identified as the remaining terminals; and display a screen including first information indicating the number of remaining terminals, wherein the processor is further configured to determine one or more combinations of countermeasures in which the number of the remaining terminals is the smallest on the basis of the terminal specific countermeasure information, and determine a combination from among the one or more combinations of countermeasures in which the number of countermeasures included in the combination is the smallest.
2. The information processing apparatus according to claim 1,
- wherein the processor is further configured to output information for specifying each of the identified remaining terminals, in addition to the number of the identified remaining terminals.
3. The information processing apparatus according to claim 1,
- wherein in a case where a plurality of countermeasures are selected, the processor is further configured to identify a terminal to which each of the selected plurality of countermeasures is applicable, on the basis of the terminal-specific countermeasure information, and identifies the remaining terminal using a logical sum of terminals identified for each of the countermeasures.
4. An information processing method performed by a computer, the method comprising:
- receiving an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability;
- reading out terminal-specific countermeasure information, indicating a countermeasure applicable for each of a plurality of terminals against the vulnerability, from a storage that stores the terminal-specific countermeasure information, and based on an assumption that the selected countermeasure is applied to the plurality of terminals, identifying remaining terminals from among the plurality of terminals which are terminals that would be left with the vulnerability due to non-applicability of the selected countermeasure based on the read-out terminal-specific countermeasure information;
- counting a number of terminals identified as the remaining terminals; and
- displaying a screen including first information indicating the number of remaining terminals;
- wherein the information processing method further comprises determining one or more combinations of countermeasures in which the number of the remaining terminals is the smallest based on the terminal-specific countermeasure information, and determining a combination from among the one or more combinations of countermeasures in which the number of countermeasures included in the combination is the smallest.
5. A non-transitory computer readable medium storing a program for causing a computer to execute an information processing method, the information processing method comprising:
- receiving an input indicating that at least one countermeasure is selected from among a plurality of countermeasures against vulnerability;
- reading out terminal-specific countermeasure information, indicating a countermeasure applicable for each of a plurality of terminals against the vulnerability, from a storage that stores the terminal-specific countermeasure information, and based on an assumption that the selected countermeasure is applied to the plurality of terminals, identifying remaining terminals from among the plurality of terminals which are terminals that would be left with the vulnerability due to non-applicability of the selected countermeasure based on the read-out terminal-specific countermeasure information;
- counting a number of terminals identified as the remaining terminals; and
- displaying a screen including first information indicating the number of remaining terminals;
- wherein the information processing method further comprises determining one or more combinations of countermeasures in which the number of the remaining terminals is the smallest based on the terminal-specific countermeasure information, and determining a combination from among the one or more combinations of countermeasures in which the number of countermeasures included in the combination is the smallest.
6. The information processing apparatus according to claim 1,
- wherein the screen further includes second information indicating, as to each of the plurality of countermeasures, a number of terminals to which the countermeasure is applicable, and
- wherein the processor is further configured to update the second information based on identification results of the remaining terminal.
6971026 | November 29, 2005 | Fujiyama et al. |
7810159 | October 5, 2010 | Bowden |
7890869 | February 15, 2011 | Mayer |
8495745 | July 23, 2013 | Schrecker |
10152302 | December 11, 2018 | Dayan |
20050005159 | January 6, 2005 | Oliphant |
20050044389 | February 24, 2005 | Oliphant |
20050138416 | June 23, 2005 | Qian et al. |
20070204346 | August 30, 2007 | Meier |
20070255724 | November 1, 2007 | Jung |
20080177994 | July 24, 2008 | Mayer |
20090282457 | November 12, 2009 | Govindavajhala |
20100325412 | December 23, 2010 | Norrman et al. |
20110119106 | May 19, 2011 | Dahl et al. |
20110138469 | June 9, 2011 | Ye |
20130191919 | July 25, 2013 | Basavapatna |
20130340084 | December 19, 2013 | Schrecker et al. |
20140173739 | June 19, 2014 | Ahuja |
20180041535 | February 8, 2018 | Kishi et al. |
102752142 | October 2012 | CN |
102801739 | November 2012 | CN |
2001-101135 | April 2001 | JP |
2002-024526 | January 2002 | JP |
2006-040196 | February 2006 | JP |
2009-110177 | May 2009 | JP |
2012-022544 | February 2012 | JP |
5125069 | January 2013 | JP |
5304243 | October 2013 | JP |
5406195 | February 2014 | JP |
200521687 | July 2005 | TW |
200842736 | November 2008 | TW |
2016/140198 | September 2016 | WO |
- Japanese Office Action for JP Application No. 2017-539800 dated May 7, 2019 with English Translation.
- International Search Report for PCT Application No. PCT/JP2016/074607, dated Oct. 11, 2016.
- Taiwan Office Action for TW Application No. 105127812 dated Dec. 25, 2018 with English Translation.
- Singapore Office Action for SG Application No. 11201801843V dated Apr. 18, 2020.
- Japanese Office Action for JP Application No. 2019-105528 dated Oct. 27, 2020 with English Translation.
Type: Grant
Filed: Aug 24, 2016
Date of Patent: Feb 16, 2021
Patent Publication Number: 20180260573
Assignee: NEC CORPORATION (Tokyo)
Inventor: Noboru Nagatani (Tokyo)
Primary Examiner: Jayesh M Jhaveri
Application Number: 15/759,582
International Classification: G06F 21/55 (20130101); G06F 21/56 (20130101); G06F 21/57 (20130101); H04L 9/00 (20060101); H04L 29/06 (20060101);